Debian Security Advisory

DSA-1429-1 htdig -- cross site scripting

Date Reported:
11 Dec 2007
Affected Packages:
htdig
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 453278.
In Mitre's CVE dictionary: CVE-2007-6110.
More information:

Michael Skibbe discovered that htdig, a WWW search system for an intranet or small internet, did not adequately quote values submitted to the search script, allowing remote attackers to inject arbitrary script or HTML into specially crafted links.

For the old stable distribution (sarge), this problem was not present.

For the stable distribution (etch), this problem has been fixed in version 1:3.2.0b6-3.1etch1.

For the unstable distribution (sid), this problem has been fixed in version 1:3.2.0b6-4.

We recommend that you upgrade your htdig package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1.dsc
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6.orig.tar.gz
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1.diff.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/h/htdig/htdig-doc_3.2.0b6-3.1etch1_all.deb
Alpha:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.